Ruling the Blocks World: Towards a Game Change Framework for Norm Implementation

Size: px
Start display at page:

Download "Ruling the Blocks World: Towards a Game Change Framework for Norm Implementation"

Transcription

1 Ruling the Blocks World: Towards a Game Change Framework for Norm Implementation Davide Grossi 1, Dov Gabbay 2, Leendert van der Torre 3 1 ILLC, University of Amsterdam d.grossi@uva.nl 2 King s College London dov.gabbay@kcl.ac.uk 3 ICR, University of Luxembourg leon.vandertorre@uni.lu Abstract The norm implementation problem concerns how a social designer can see to it that the agents comply with a given set of norms in a given multiagent system. In this paper we discuss how various ways to implement norms in a multiagent system can be distinguished in a formal game-theoretic framework. In particular, we show how different types of norm implementation can all be uniformly understood as types of transformations of extensive games. We introduce the notion of retarded preconditions to implement norms, and we illustrate the framework and the various ways to implement norms in the blocks world environment. 1 Introduction Normative multi-agent systems (NMAS) [10] study the specification, design, and programming of systems of agents by means of systems of norms. Norms allow for the explicit specification of the standards of behavior the agents in the systems are supposed to comply with. Once such a set of norms is settled, the question arises of how to organize the agents interactions in the system, in such a way that those norms do not remain so to say dead letter, but they are actually followed by the agents. In other words, designing a NMAS does normimpl.tex, Tuesday 30 th June, 2009, 18:54. 1

2 not only mean to state a number of standards of behavior in the form of a set of norms, but also to organize the system in such a way that those standards of behavior are met by the agents participating in the system. The paper moves the first steps towards a formal understanding of the norm implementation problem, defined as follows. The norm implementation problem. How can a given set of norms be made complied with by the agents in a given system? The norm implementation problem is part of the more general problem of norm creation. Norm creation distinguishes between the creation of the obligation or prohibition, and the creation of the associated sanction. For example, the obligation may be to return books to the library within three weeks, and the sanction associated with its violation is that a penalty has to be paid, and no other books can be borrowed. The creation of the obligation is often called the norm design problem [43], and the creation of the sanction is an example of what we call the norm implementation problem. Thus, in the library example, the norm implementation problem is that given that we want people to return their books within three weeks, how can we build a system such that they will actually do so? However, introducing sanctions is not the only way to implement norms. In other cases, the norm can be regimented, or instead of penalties, rewards can be introduced. In this paper we introduce a formal framework that can represent these various solutions to the norm implementation problem, which can be used to analyze them, or to make a choice among them. The assumption underlying our research problem is that the norm implementation problem can be studied in isolation. We thus argue against the common idea that norm implementation can be studied only together with the norm design problem, in the context of norm creation. For example, when a system designer has to choose between various kinds of norms, at the same time he has to take into account how the norm can be implemented. If a norm is chosen which cannot be implemented, such that it will not be complied with, then the norm may even be counterproductive, undermining the belief or faith into the normative system (in particular, this holds for legal systems). Though we agree that a choice among norms also has to take the available implementations into account, we believe that this is not an argument against studying norm implementation in isolation. The reader may be surprised that the norm implementation problem has not been dealt with thus far, given the high number of publications on social, organizational and deontic theories recently. Ideas we discuss can be found scattered over this literature, but they have not been presented systematically and in a uniform framework. Our aim in this paper is to unify these ideas and present them in a more abstract way. The first requirement on a framework for norm implementation is that it can represent existing widely discussed norm implementation methods such as regimentation and sanctioning. Moreover, a second requirement is that such a framework can also represent and reason about new ways of norm implementation, such as changing the existing norms. A formal framework may even suggest new ways to implement norms, not discussed before. Our research problem therefore breaks down into the following sub-questions: 2

3 1. Which formal model to study the norm implementation problem? 2. How to model regimentation? 3. How to model enforcing? 4. How to model norm change? The perspective assumed on the problem is based on formal logic and the primary aim of the paper is to present a simple class of logical models, and of transformations on them, as salient representations of the implementation problem. Moreover, we use a game-theoretic approach. We use the simplest approach possible, so we can focus on one same framework for many kinds of norm implementation, and are not lost in technical details about individual approaches. As in classical game theory, our actions are abstract and we do not consider issues like causality, or the composition of actions in plans. We consider only perfect information games, and we thus do not consider the problem how norm are distributed and communicated to a society. Moreover, we do not consider concurrent actions of the agents, although this feature could be easily added. However, we do represent the order of actions, that is, we use extensive form, because we need to do so to distinguish some of the norm implementation methods, and thus we do not use the more abstract strategic form used in most related work (such as Tennenholtz and Shoham s artificial social systems [43]). We do not go into details of solution concepts of game theory, and we thus basically use a kind of state automata or process models. Within a game-theoretic approach, we need to represent four things: the game without the implemented norm, the game together with the implemented norm, the procedure to go from the former to the latter, and the compliance criterion. We test our model by introducing retarded preconditions. For example, assume that in the tax regime of a country, for people who leave the country there is a period of three years after which it is checked whether someone has really left the country. In this example, the precondition is checked only after three years, and if the person has returned to the country, the consequences of leaving the country are retracted. Likewise, with actions with nondeterministic effects, we can say that the precondition depends on the effect. For example, if there are no concurrent updates in the database, then the update will be accepted, otherwise it will be rolled back. In the blocks world, assume that a block may not be puton another block if it stays there for three minutes. If it stayed there for three minutes, then we can undo the action (alternatively, one can sanction it, of course). We distinguish norm regimentation from automatic enforcement and enforcement agents, assuming actions can be taken only if preconditions hold. Some of such actions are forbidden, so all actions in order to be taken must satisfy the precondition. For regimentation we consider violation conditions as retarded preconditions of actions. In this action model, assumed actions can be taken in some cases even though the preconditions do not hold. When a violation occurs, i.e. when the retarded precondition does not hold, the various strategies to implement norms follow as a consequence. It is our conviction that such approach will provide an answer to the more general issue of finding a logical formalism that could play for programming NMAS the role that BDI logics (e.g. [39]) have played for the programming 3

4 of single agents. Such an issue was recognized as central for the NMAS community during the NorMAS 07 Dagstuhl Seminar [13], and it was raised in the following incisive form: BDI : Agent Programming =? : NMAS Programming. This equation represents two issues. First, it raises the question about which concepts should be used for programming normative multiagent systems, given that cognitive concepts like beliefs, desires and intentions are used to program individual agents. There is some consensus that instead of cognitive concepts, for normative multiagent systems social and organizational concepts are needed, such as trust, norms and roles. Second, from a logical perspective, it raises the question which logical languages used for specification and verification can be used for NMAS, like BDI-CTL is used for single agents. Thus far, only partial answers have been given to this question. For example, deontic logic can be used to represent norms, but it cannot be used to say how agents make decisions in normative systems, and about the multiagent structure of normative systems. We illustrate the framework and the various ways to implement norms in the blocks world environment, because the well-known planning environment explains the use of normative reasoning and the challenges of norm implementation for a large AI audience. There are many variants of the blocks world around, we use a relatively simple one with deterministic actions and without concurrent actions. Alternative well known examples we could have picked is Wumpus from Russel and Norvig textbook [41]. We assume that all norms and their implementations are known once they are created, and we thus do not study the norm distribution problem. Moreover, we assume that everyone accepts the existence of a new norm, even when he does not comply with it. Thus, we do not consider the norm acceptance problem. We do not consider cognitive aspects of agents, and we thus do not consider the bridge between our framework for MAS and existing BDI frameworks for cognitive agents (see, e.g., [11]). The paper follows the research questions and proceeds as follows. In Section 2 we start with the game-theoretic framework for norm implementation and a logic for representing extensive games, and we introduce a running example. Sections 3, 4, 6 provide formal semantics to the three implementation strategies of regimentation, enforcement and, respectively, normative change. The finding of each section will be illustrated by means of the running example. In Section 7 related work at the intersection of norms and multiagent systems is discussed. Conclusions follow in Section 8. 2 Formal framework and running example The present section is devoted to setting the stage of our investigations. 2.1 Norms and logic The formal representation of norms by means of logic has a long-standing history. In the present paper we assume a very simple perspective based on 4

5 [2, 31, 35] representing the content of norms as labeling of a transition systems in legal and illegal states, which we will call violation states. In this view, the content of a normative system can be represented by a set of statements of the form: pre [a]viol (1) that is, under the conditions expressed in pre, the execution of action a necessarily leads to a violation state. Such statements can be viewed as constraints on the labeling of transition systems. Restating Formula (1), all states which are labelled pre are states such that by executing an a-transition, states which are labelled viol are always reached. 1 It follows that a set of formulae as Formula (1) defines a set of labelled transition systems (i.e., the set of transition systems satisfying the labeling constraints stated in the formulae), and such a set of transition systems can be viewed as representing the content of the normative system specified by those formulae. Now, within a set of transition systems modeling a set of labeling constraints, transition systems may make violation states possibly reachable by transitions in the systems, and others possibly not. So, from a formal semantics perspective, we can think of the implementation problem as the problem of selecting those transition systems which: 1. Model a given normative system specification in terms of labeling constraints like Formula (1); 2. Make some violation states unreachable within the transition system, hence regimenting [30] the corresponding norms; 3. Make other violation states reachable but, at the same time, disincentivizing the agents to execute the transitions leading to those states, for instance by triggering appropriate systems reactions such as sanctioning, thus enforcing the corresponding norms [24]. To sum up, normative systems can be studied as sets of labeling constraints on the systems transitions generated by agents interaction, and the implementation problem amounts to designing the NMAS according to those transition systems which, on the one hand, model the labeling constraints and, on the other hand, make the agents access to violation states either impossible (regimentation), or irrational (enforcement). What we mean by the term irrational, is precisely what is studied by game theory [38]. The next section moves to the fundamental role that we think game theory can play for the analysis of the norm implementation problem. 2.2 Norm implementation and games In a social setting, like the one presupposed by NMAS, action essentially means interaction. Agents actions have repercussions on other agents which react accordingly. Norm enforcement takes care that agents actions leading to violation states happen to be successfully deterred, either by a direct system reaction or, as we will see, by means of other agents actions. The readily available formal 1 The reader is referred to [5] for more details on the logical study of labelled transition systems. 5

6 framework to investigate this type of social interaction is, needless to say, game theory. In fact, the present paper uses the term implementation in the technical sense of implementation theory, i.e., that branch of game theory which, together with mechanism design [27, 29, 34, 28], is concerned with the design of the interaction rules the rules of the game [36] or mechanisms to be put into place in a society of autonomous self-interested agents in order to guarantee that the interactions in the society always result in outcomes which, from the point of view of the society as a whole (or from the point of view of a social designer), are considered most desirable (e.g., outcomes in which social welfare is realized). 2 In this paper we are going to work with games in extensive forms [38]. Games in extensive form have recently obtained wide attention as suitable tools for the representation of social processes [3]. However, the key advantage for us of choosing games in extensive form is that such games are nothing but tree-like transition systems. This allows us to directly apply the logicbased representation of norms exposed in Section 2.1, thus obtaining a uniform formal background for talking about both norms and games and, hence, for formulating the norm implementation problem in an exact fashion. To ease such exact formulation, we will make use of a simple running example. 2.3 Running example: ruling the Blocks World We assume a multiagent variant of the blocks world, where agents cannot do concurrent actions (so we do not consider the issue of lifting a block simultaneously). Therefore we assume that the agents have to take actions in turn. In the standard blocks world scenario [41], the pre- and postcondition specification of the action move(a, b, c) ( move block a from the top of b to the top of block c) runs as follows: (on(b, a) clear(c) clear(b) turn(i)) move(b, a, c)(i) (2) (on(b, a) clear(c) clear(b) turn(i)) [move(b, a, c)(i)]((on(b, c) (3) clear(b) clear(a)) (4) that is to say: the robotic arm i can execute action move(b, a, c) iff it is the case that both blocks b and c are clear, and it is its turn to move;and the effect of such action is that block b ends up to the top of block c while block a becomes clear. By permutation of the block identifiers, it follows that action move(a, d, c) cannot be executed in the state depicted in Figure 1, in which block b represents the floor. Suppose now the robotic arm to be in state of executing action move(a, d, c) also if block a is not clear, thus possibly moving a whole stack of blocks at one time. Suppose also that the system designer considers such actions as undesirable. In this case the robotic arm can be considered as an autonomous agent, and the designer as a legislator or policymaker. In order to keep the example perspicuous, the scenario is limited to one agent, but we can express multiple agents analogously. The action move(a, d, c) would get the following specification. Formula (5) does no longer demand clear(a), but Formula (5) 2 Therefore, when we talk about norm implementation we are not referring to the term implementation in its programming acception like, for instance, in [22]. 6

7 b a c d Figure 1: Initial state. does not specify the effect when this is the case, i.e., when two or more blocks are moved simultaneously. (on(a, d) clear(c) turn(i)) move(a, d, c)(i) (5) (on(a, d) clear(c) clear(a) turn(i)) [move(a, d, c)(i)](on(a, c) clear(a) clear(c)) (6) (on(a, d) clear(c) clear(a) turn(i)) [move(a, d, c)(i)](on(a, c) clear(a) clear(c) viol(i)) (7) where viol(i) intuitively denotes a state brought about by agent i which is undesirable from the point of view of the system designer. Suppose also that the system designer wants to implement the norm expressed by Formula (7)? 3 The paper tackles this question displaying a number of strategies for norm implementation (Sections 3, 4 and 6). 2.4 Talking about norms and extensive games in the Blocks World In this section we bring together the logic-based perspective on norms sketched in Section 2.1 with the game-theoretic setting argued for in Section 2.2. This will be done in the context of the Blocks World scenario of the previous section. As a result we obtain a very simple modal logic language 4 which suffices to express the properties of extensive games relevant for the purpose of the norm implementation analysis of the Blocks World Language. The language is the standard propositional modal logic language with n modal operators, where n = Act, that is, one modal operator for each available transition label. In addition, the non-logical alphabet of the language, consisting of the set of atomic propositions Pr and of atomic actions Act, contains at least: 3 Notice that Formula (7) is an instance of Formula (1). 4 For a comprehensive exposition of modal logic the reader is referred to [6]. 7

8 Atoms in Pr denoting game structure: for all agents i I, turn(i), payoff(i, x), labeling those states where it is player s i turn, and where the payoff for player i is x, where x is taken from a finite set of integers. Atoms in Pr denoting Blocks World states-of-affairs: for all blocks a, b B,on(a, b), clear(a), labeling those states where block a is on block b, and where block a has no block on it. Atoms in Pr denoting normative states-of-affairs: for all agents i I, viol(i), labeling those states where player i has committed a violation. Atoms in Act denoting deterministic transitions: for all agents i I and blocks a, b, c B: move(a, b, c)(i), labeling those state transitions where player i moves block a from the top of block b to the top of block c. The inductive definition of the set of formulae obtained from compounding via the set of Boolean connectives {,, } and the modal connectives { a }a Act is the standard one Semantics. Models are labelled transition systems m = W, {R a } a Act, I such that: W is a non-empty set of system states; {R a } a Act is a family of labelled transitions forming a tree; I : Pr 2 W is the state labeling function. The standard satisfaction relation = between pointed models (m, w) and modal formulae is assumed [6]. In addition, the models are assumed to satisfy the determinism condition, for all a Act: a ϕ [a]ϕ. Please note that such a condition is typical of the representation of actions within games in extensive form. 5 Now everything is put into place to formulate with exactness the question that will be addressed in the next sections. Consider a model m as represented in Figure 2. State w 1 is assumed to satisfy the relevant Blocks World description of Figure 1: (m, w 1 ) = on(a, d) clear(c) clear(b) clear(a). 6 Notice that in the model it is also assumed that agent i leans towards executing the action leading to the viol(i)-state which has got a higher payoff. Consider now a normative specification as represented by formulae like Formula (7), together with an initial model (such as the one in Figure 2). What are the transformations of the model m, which guarantee the normative specification to be complied with by the agents in the system? This is, in a nutshell, what we are going to investigate in the remainder of the paper. 5 The reader is referred, for more details, to [4]. 6 To avoid clutter in figures and notation, in what follows forbidden actions (e.g. move(a, d, c)(i) at w 1 ) are denoted by, and allowed actions (e.g. move(b, a, c)(i) at w 1 ) are denoted by. We are confident that this notational simplification will not give rise to misunderstandings. 8

9 turn(i) w2 w1 - w3 viol(i) payoff(j,0) Figure 2: Initial model. 2.5 Two important caveats Before starting off with our analysis, we find it worth stating explicitly also what this work is not about. The issue of norm implementation as intended here has already received attention in the literature on MAS in the form of the quest for formal languages able to specify sanctioning and rewarding mechanisms to be coupled with normative systems specifications. An example in this sense but not the unique one is [33], where authors are concerned with the development of a whole framework for the formal specification of NMAS. Such a framework is able to capture also norm-implementation mechanisms such as sanctioning and rewarding systems. As our research question discussed in Section 1 shows, our aim in this paper differs from all such studies which can be found in the literature. The purpose of the paper is not to develop a formalism for the specification of one or another mechanism which could be effectively used for implementing norms in MAS. Rather, the paper aims at moving a first step towards the development of a comprehensive formal theory of norm implementation. Such a theory should be able to capture all forms of norm implementation mechanisms highlighting their common features and understanding them all as system transformations. Finally, we want to stress that the present contribution abstracts completely from the issue concerning the motivating aspect of norms, that is to say, their capacity to influence and direct agents mental states and actions. We are not assuming here that agents have the necessary cognitive capabilities to autonomously accept or reject norms [18]. To put it yet otherwise, the perspective assumed here is the one of a social designer aiming at regulating a society of agents by just assuming such agents to be game-theoretic agents. We are of course aware of this simplification, which is on the other hand necessary as we are facing the very first stage of the development of a formal theory. 9

10 turn(i) w2 w1 payoff(j,0) Figure 3: Regimentation. 3 Making violations impossible The present sections studies two simple ways of making illegal states unreachable within the system. 3.1 Regimentation Regimentation [30] is the most simple among the forms of implementation. Consider our running example, and suppose the social designer wants to avoid the execution of move(a, d, c) by (i) in the case block a is not clear, as expressed in Formula (7). The implementation via regimentation for a transition a can be represented by a transformation (or update) m m of the model m into the model m such that: R m a := Rm a {(w, w ) (m, w) = prea & (m, w ) = viol(i)} where prea are the preconditions of the execution of a which lead to a violation. In other words, it becomes in m impossible to execute a transition with label a in prea-states which lead to a violation state. Notice that if pre(a) = then the update results in R m a =. In the running example, where a = move(a, d, c)(i), such update results in pruning away the edges labeled by (i.e., move(a, d, c)(i) form the frame of m (Figure 3). The regimentation of the prohibition expressed in Formula (7) corresponds therefore to the validity of the following property: on(a, d) clear(c) clear(a) turn(i) [move(a, d, c)(i)] and hence, by modal logic and some additional background knowledge on the Blocks World: on(a, d) clear(c) clear(a) turn(i) move(a, d, c)(i) which, notice, is a strengthening of Formula (5). In other words, regimentation is an update restricting the possibility of actions of the agents by limiting 10

11 e b a c d Figure 4: Retarded preconditions. Initial state. them exactly to the ones generating legal states. It is instructive to notice that the standard Blocks World scenario can be viewed precisely as a result of the regimentation of the normative variant of the scenario which we are considering here. 3.2 Retarded preconditions Ordinary action logic describes the actions using preconditions and postconditions. If a is an action with precondition prea and postcondition posta then prea a (8) prea [a]posta (9) express that action a can be executed if and only if prea hold (Formula (8)) and with the effect expressed by posta (Formula (9)). So in the standard account of the blocks world, if the world is in the situation as depicted in Figure 1, b can be moved on top of c but a cannot be moved. According to the normative perspective we have assumed in the running example, instead of imposing logically strong preconditions, we state logically weak preconditions for action, which means allow their execution in a wider range of states and assuming indeterminacy. In addition, we label states reached by performing actions as violation states when they are executed under undesirable conditions (see Section 2.3). In short, actions are allowed to be executed under circumstances which can possibly lead to violations, but only if the effects are still acceptable. If they are not, then nothing has happened. These intuitions lead us to introduce, within the framework exposed in Section 2.4, two new modal operators: ϕ a ψ and [ϕ a] ψ. The semantics of these new operators is defined as follows: m, w = [ϕ a] ψ iff w W if wra ϕ w then m, w = ψ m, w = ϕ a ψ iff w W such that wra ϕ w and m, w = ψ where ϕ denotes, as usual, the truth-set of ϕ and Ra ϕ is the subset of Ra containing those state pairs (w, w ) such that the second element w of the pair satisfies ϕ. 7 Notice, therefore, that the new modal operators take an action (e.g., 7 It might be instructive to notice that such operators are definable within standard dynamic logic [19] by means of the sequencing operator ; and the test operator?: [ϕ a] ψ := [a;?ϕ]. However, the full expressivity of dynamic logic is not required given our purposes. 11

12 b e a a a b c d e c d e b c d Figure 5: Situation A Figure 6: Situation B Figure 7: Situation C a) and a formula (e.g., ϕ) yielding a new complex action type (e.g., ϕ a). Such action type correspond, semantically, to those state transitions which are of the given action type (a) and which end up in the given states (ϕ). By means of this newly introduced operators, we can express that the execution of a given action a is possible only under the condition that it has certain precise effects ϕ (Formula (10)), and that each time it is executed having such effects ϕ, it also guarantees that ψ holds (Formula (11)): prea ret prea a (10) prea [ret prea a] posta (11) where prea represents the precondition of a where the execution of a possibly leads to a violation; ret prea the postcondition of prea which are tolerated, i.e., its retarded preconditions; and posta the postconditions of ret prea a. Let us now give an example. Suppose we have the situation depicted in Figure 4. We move a, and we might end up with one of the three options in Figures 5-7. Suppose also that only the situation depicted in Figure 5 is tolerable to us. That is, a can be moved on c only if it is slid out carefully from the tower composed by a, b, e. Such tolerance can be expressed by means of retarded precondition, that is, a precondition which is evaluated as a result of the action performed. In the example at hand, the execution of action move(a, d, c) is tolerated in the case a is moved from within a tower only if the result of the action yields the situation depicted in Figure 5: 8 on(a, d) on(e, b) clear(c) on(e, b) move(a, d, c) (12) on(a, d) on(e, b) clear(c) [ on(e, b) move(a, d, c)] (13) on(a, d) on(e, b) clear(c) [on(e, b) move(a, d, c)]on(a, c). (14) Block a can be moved also in the case it is not clear, provided that this does not change the respective disposition of other blocks b and e (Formula 12). If that is not the case, than it will not be possible to move it (Formula 13). The effect of the execution of a under the retarded precondition that the stack of b and e is left intact results in a being placed on c (Formula 14). The specification of retarded preconditions for actions can be viewed as a smoothening of regimentation requirements. As shown in the example above, instead of regimenting the non-execution of action move(a, d, c) in case block a 8 We drop the turn(i) atoms in the following formalization. 12

13 as positioned within a tower, we can express that the execution can be tolerated, provided it gives rise to specific results (Figure 5). In a nutshell, the use of retarded preconditions is typical of situations where the execution of a given action a under certain circumstances ϕ can possibly lead to a violation state: ϕ a viol. In such cases, we might not want to impose a regimentation, requiring that: ϕ [a] but we would rather still allow the agent to perform the action, provided that it does not end up in violation states, that is, we allow the execution of the action under the potentially problematic conditions ϕ but only by assuming the retarded precondition viol: ϕ viol a ϕ [viol a] We conclude spending a few more words on the notion of retarded precondition. Such notion of retarded precondition is implicit in our culture. The saying you can t argue with success illustrates that way of thinking. An agent can take action without following the rules and if he is successful then we have to accept it. A major example is Admiral Nelson defying command and defeating the Spanish fleet. He is a hero. Had he failed, he would have been court marshalled. 4 Perfect enforcement Perfect enforcement takes place when the execution of an action leading to a violation state is directly deterred by modifying the payoffs that the agent would obtain from such an execution. The following condition says that the best action does not imply a violation of the norm. It covers both penalties and rewards, or combinations of them. Let Pr pay denote the set of payoff atoms and let R m Act = a Act Ra, that is, R m Act labels the whole transition tree of model m. The implementation via perfect enforcement w.r.t. a transition a is a model update m m which does not modify the frame (W, {R a } a Act ) of the model, and only modifies the evaluation of payoff atoms 9 so that w W: If wr m a w & (m, w ) = viol(i)) payoff(i, x) then w W such that wr m Act w & (m, w ) = viol(i)) payoff(i, y) with x < y. Recall that the update does not modify the interpretation of atoms which are not payoff atoms nor the frames of the model (so, R m a = Rm a for all a Act). Intuitively, such an update guarantees that each agent faced with a decision between executing a transition a leading to a violation state, and one leading to a legal one, will if they act rationally from a decision-theoretic perspective chose for the latter. 9 That is to say: I m Pr Pr pay = I m Pr Pr pay. 13

14 A number of different implementation practices can be viewed as falling under this class such as, for instance, fines or side payments. However, the common feature consists in viewing the change in payoffs as infallibly determined by the enforcement, thereby giving rise to perfect deterrence. The next section will show what happens if such an assumption is dropped. Getting back to our running example, the perfect enforcement of the prohibition expressed in Formula (7) results, therefore, in the validity of the following property: on(a, d) clear(c) on(b, a) turn(i) ([]payoff(i, 1) [ ]payoff(i, 0)) where = move(b, a, c)(i) and = move(a, d, c)(i). We deem worth stressing again the subtle difference between perfect enforcement and regimentation. While regimentation makes it impossible for the agents to reach a violation state, automatic enforcement makes it just irrational in a decision-theoretic sense. In other words, it is still possible to violate the norm, but doing that would be the result of an irrational choice. As such, perfect enforcement is the most simple form of implementation which leaves the game form (i.e., the frame of the modal logic models) intact. Although the extensive game considered is a trivial one-player game, it should be clear that taking more player into consideration would not be a problem. In such case, the application of solution concepts such as sub-game perfect Nash [38] would become relevant. 5 Enforcers Commonly, perfect deterrence is hard to realize as each form of sanctioning requires the action of some third-party agent whose role consists precisely in making the sanctions happen. Enforcement via agents (the enforcers) corresponds to the update of model m to a model m defining a new game form between a player i and enforcer j. The actions of enforcer j are punish(i) and reward(i). As a result of such an update, the original model m results in a sub-model of m. Let r m a : W 2W be the function associating to each state in W the states reachable by a-transitions. If w r m Act & (m, w) = turn(j) payoff(i, x) then w W such that wr m reward(i) w & (m, w ) = payoff(i, y) with x y and w W such that wr m punish(i) w & (m, w ) = payoff(i, y) with y < z where z is such that w w r m Act (m, w) = viol(i)) payoff(i, x). What the definition above states is that the update consists in adding to every dead end in m a trivial game consisting of (at least) a binary choice by enforcer j between punishing or rewarding. The result of a reward leaves the payoff of i intact (or it increases it), while the result of a punishment changes i s payoff to a payoff which is lower than the payoff i would have obtained by avoiding to end up in a violation state. In the running example, the action of the enforcer swoop the payoffs of agent i from 0 to 1 or from 1 to 1 in case of a reward; from 1 to 0 or from 0 to 0 in case of a punishment, just like in the case of automatic enforcement. 14

15 turn(j) - w4 viol(j) turn(i) w2 w5 w1 - w3 w6 viol(i) turn(j) - w7 viol(j) payoff(j,0) Figure 8: Enforcement norms. However, the use of agents as enforcers implies the introduction of a further normative level, since the enforcer can choose whether to comply or not with its role, that is, punish if i defects, and reward if i complies: (turn( j) viol(i)) [reward(i)]viol( j) (15) (turn( j) viol(i)) [punish(i)]viol( j) (16) Whether the enforcement works or not, depends on the payoffs of the enforcer j. We are, somehow, back to the original problem of guaranteeing the behavior of an agent (the enforcer in this case) to comply with the wishes of the social designer. The implementation of norms calls for more norms (Figure 8). Enforcement via enforcing agents lifts the implementation problem from the primary norms addressed to the agents in the system, to norms addressed to special agents with institutionalized roles. 5.1 Regimenting enforcement norms. At this point, the norms expressed in Formulae (15) and (16 need implementation. Again, regimentation can be chosen. The result of regimentation of enforcement norms in the running example is depicted in Figure 9. Formally, this corresponds to an update m m of m where: R m punish(i) = R m punish(i) {(w, w ) m, w = turn(j) viol(i) & m, w = viol(j)} R m reward(i) = R m reward(i) {(w, w ) m, w = turn(j) viol(i) & m, w = viol(j)} As a result, the enforcer j always complies with what expected from its role. In a way, regimented enforcement can be viewed as an equivalent variant of perfect enforcement since its result is an adjustment of the payoffs of agent i w.r.t. to the system s norms. 5.2 Enforcing enforcement norms. If the payoffs of the enforcer are appropriately set in order for the game to deliver the desired outcome, then the system is perfectly enforced by enforcer j who 15

16 turn(j) turn(i) w2 w5 w1 - w3 w6 viol(i) turn(j) payoff(j,0) Figure 9: Regimentation of enforcement norms. autonomously complies with the enforcement norms expressed in Formulae (15) and (16), punishing player i when i commits a violation and rewarding i when i complies (Figure 10). In the running example, perfect enforcement turn(j) - w4 payoff(j,0) turn(i) w2 w5 payoff(j,1) w1 - w3 w6 payoff(j,1) viol(i) turn(j) - w7 payoff(j,0) payoff(j,0) Figure 10: Perfect enforcement. of enforcement norms can be defined by a simple update m m of the interpretation functions of the two models such that: I m (payoff(j, 0)) = I m (viol(j)) I m (payoff(j, 1)) = W I m (viol(j)) which results in a perfect match between higher payoffs and legal behavior. Figure 11 represents, in strategic form, the extensive game depicted in Figure 10 between player i and enforcer j. It is easy to see that the desired outcome in which both i and j comply is the only Nash equilibrium [38]. It goes without saying that much more complex game forms could be devised, and different equilibrium notions could be chosen for norm implementation purposes. It is at this level that a number of concepts and techniques could be imported from 16

17 Mechanism Design and Implementation Theory [27, 29, 34, 28] to the formal theory of NMAS. 5.3 Who controls the enforcers? Our analysis clearly shows the paradox hiding behind norm implementation. In order to implement norms, it is likely to need more norms. The implementation of a set of norms can be obtained either via regimentation or via automatic enforcement or by the specification of an enforcement activity to be carried out by an enforcer. Enforcement specification happens at a normative level, i.e., via adding more norms to the prior set which, in turn, also require implementation. Schematically, suppose X to be the non-empty set of to-be-implemented norms, Regiment(X) to denote the set of norms from X which are regimented or automatically enforced, and Enforce(X) to denote the set of norms containing X together with all the norms specifying the enforcement of X (X Enforce(X)). The implementation of S is the enforcement of the norms in S which are not regimented: Implement(X) = Enforce(X \ Regiment(X)). In other words, to implement a set of norms amounts to implement the set of unregimented norms together with their enforcement. These observations clearly suggest that the implementation of a set of norms yields a set of norms. Somehow, it is very difficult to get rid of norms when trying to implement them. The only possibility is via full regimentation or automatic enforcement. If Regiment(X) = X then there is no norm left to be implemented. Instead if Regiment(X) X then Implement(S), which means that the implementation operation should be iterated on Implement(X). In principle, such iteration is endless, unless there exists a final implementation level whose norms are all regimented or automatically enforced. 6 Implementation via norm change This section concerns the ways of obtaining desired social outcomes by just modifying the set of norms of the system. The formal analysis of such phenomena, which is pervasive in human normative systems, is strictly related with the formal study of counts-as [23] and intermediate concepts [32]. As an example, consider the model m obtained via the update of the initial model m corresponding to perfect enforcement (Figure 10). Suppose now the social designers wants to punish player i no matter what it does. One way for doing this would be to go back to the initial model m, to replace the enforcer j i - - (1,0) (0,1) (0,0) (1,1) Figure 11: Enforcement of the Blocks World scenario in strategic form 17

18 norms expressed in Formulae (15) and (16) by the following norm: turn( j) [reward(i)]viol( j) (17) and then update m to m in order to implement the norm expressed in Formula (17), for instance via perfect enforcement. A much quicker procedure would consist in updating model m trying to inherit its implementation mechanism. This can be done by simply modifying the extension of atom viol(i) in order for it to include state w 3, thereby automatically triggering the enforcement norms expressed in Formulae (15) and (16). As a result, the enforcement mechanism in place in model m are imported for free by m via simply changing the meaning of viol(i) (Figure 12). As you can see, the payoffs for enforcer j are different from Figure 10. viol(i) turn(j) w6 payoff(j,1) turn(i) w2 - w7 payoff(j,0) viol(j) w1 w3 - w6 payoff(j,1) viol(i) turn(j) - w7 payoff(j,0) viol(j) Figure 12: Implementation via norm change. The update of the extension of viol(i) can be obtained, for instance, by adding the following norm to the system: on(b, a) clear(b) clear(c) turn(i) [move(b, a, c)(i)]viol(i) (18) To put it otherwise, such procedure exploits the nature of viol(i) as an intermediate concept occurring as precondition of other norms. In this case the norms involved are the enforcement norms expressed in Formulae (15) and (16). 7 Related work In this section we consider whether existing work in normative multiagent systems is able to answer the equation discussed in the introduction. BDI : Agent Programming =? : NMAS Programming. Since BDI-CTL [17] is used as a formal specification and verification language for agent programming, an obvious candiate for our question mark is an extension of this language with deontic concepts such as obligations and permissions, called BOID-CTL [15, 16]. Such a logic is simply a modal combination 18

19 of an agent logic and a modal deontic logic. The drawback of this approach is that the norms are nor represented explicitly. Another obvious candidate for the question mark is a theory of normative systems [1]. Whereas deontic logic assumes a normative system such as a legal code in the background which is not made explicit, a normative system makes the norms themselves explicit, such that we can say that a norm is active, in force, violated, and so on [47]. See [25] for an up to date review on the distinction between a theory of norative systems and deontic logic, and the challenge to bridge the two. A theory of normative systems is useful for norm representation and reasoning, but not for the representation of aspects such as the multiagent structure of a normative system. The first candidate for the question mark is Tennenholtz and Shoham s game-theoretic approach to artificial social systems. However, the central research question of their work [43, 44, 45] consists in studying the emergence of desirable social properties under the assumption that a given social law is followed by the agents in the society at hands. The problem of how a social law can be implemented in the society is not discussed. The second candidate is Boella and van der Torre s game-theoretic approach to normative multiagent systems, which studies the more general problem of norm creation [7, 12, 11]. For example, the introduction of a new norm with sanctions is modeled as enforceable norms in artificial social systems as the choice among various strategic games [8]. They focus in particular on the enforcement of norms using enforcers, and discuss the role of procedural norms to motivate the enforcers [9]. They consider the creation of a new norm into a system of norms, whereas in this paper we do not consider the effect of norm implementation on existing norms. They argue that the infinite regression of enforcers can be broken if we assume that enforcers control each other and do not cooperate [8]. Since they use strategic rather than extensive games they cannot distinguish some subtle features of implementation such as retarded preconditions. Moreover, they do not give a procedure to go from a norm to its implemented system. Finally, they do not consider other methods than sanctioning and rewarding to implement their norms. They do consider also cognitive extensions of their model, which we do not consider in this paper. See [11] for a detailed discussion on their approach. There are many organizational and institutional theories, such as the ones proposed in [23], and there is a lot of work on coordination and the environment [20, 40]. Institutions are built using constitutive norms defining intermediate concepts. However, this work is orthogonal to the work presented in this paper in as much as, although sporadically addressing one or another form of implementation, it never aims at laying the ground of an overarching formal framework. 8 Conclusions Aim of the paper is to illustrate how the issue of norm implementation can be understood in terms of transformations (updates) performed on games in extensive forms. The paper has sketched some of such updates by means of a toy example, the blocks world, and mapped them to norm implementation strategies, such as regimentation, automatic enforcement, enforcement via en- 19

20 forcers, and implementation via norm change. The logical analysis (e.g., in a dynamic logic setting) of the update operations sketched here is future work. Such an analysis will make some intricacies of implementation explicit, such as, for instance the fact that by implementing new norms, the implementation of other norms might end up being disrupted. Moreover, we introduce two views on representing forbidden actions, the classical one in which the precondition has to be satisfied before the action can be executed, and one based on so-called retarded preconditions. The two views coincide if the language allows for action names, and we can include as part of the state a list of which actions are allowed in this state. This can be formalised by the predicate allowed(x), where X are names for actions. The allowed(x) predicate can be part of the preconditions of X. We can use the feedback arrows of retarded preconditions in Kripke models to change accessibility. This will implement the severed connections in the diagrams, and the semantics would then be reactive Kripke models. Consider for example the restriction you should not take any action three times in a row. With retarded preconditions, we can do a roll-back when the action occurs three times in a row, whereas with regimentation we have to predict whether the action is going to be executed three times rather than two or four times. A further comparison of the two views is topic for further research. Finally, topics for further research are also the development of a more detailed classification of norm implementation methods, the application of retarded preconditions to the analysis of ambiguous norms. Acknowledgments. Davide Grossi is supported by: Nederlandse Organisatie voor Wetenschappelijk Onderzoek (VENI grant ). References [1] C. E. Alchourrón and E. Bulygin. Normative Systems. Springer Verlag, [2] A.R. Anderson. A reduction of deontic logic to alethic modal logic. Mind, 22: , [3] J. van Benthem. Extensive games as process models. Journal of Logic, Language and Information, 11: , [4] J. van Benthem. Logic in games. Lecture Notes of the ILLC graduate course on Logic, Language and Information, Universiteit van Amsterdam, Amsterdam, The Netherlands, [5] J. van Benthem, J. van Eijck, and V. Stebletsova. Modal logic, transition systems and processes. Journal of Logic and Computation, 4(5): , [6] P. Blackburn, M. de Rijke, and Y. Venema. Modal Logic. Cambridge University Press, Cambridge, [7] G. Boella and L. van der Torre. : The social delegation cycle. In Deontic Logic: 7th International Workshop on Deontic Logic in Computer Science ( EON 04), volume 3065 of LNCS, pages 29 42, Berlin, Springer. 20

21 [8] G. Boella and L. van der Torre. Enforceable social laws. In Procs. of 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 05), pages , New York (NJ), ACM Press. [9] G. Boella and L. van der Torre. Substantive and procedural norms in normative multiagent systems. Journal of Applied Logic, in press. [10] G. Boella, L. van der Torre, and H. Verhagen. Introduction to normative multi-agent systems. Computational and Mathematical Organization Theory, 12(2-3):71 79, [11] Guido Boella and Leendert van der Torre. A game-theoretic approach to normative multi-agent systems. In Guido Boella, Leon van der Torre, and Harko Verhagen, editors, Normative Multi-agent Systems, number in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, [12] Guido Boella and Leendert van der Torre. A game-theoretic approach to normative multi-agent systems. In Normative Multi-agent Systems (Nor- MAS 07), in press. [13] Guido Boella, Leon van der Torre, and Harko Verhagen, editors. Normative Multi-Agent Systems, number in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, [14] W. Briggs and D. Cook. Flexible social laws. In Proceedings 14th International Joint Conference on Artificial Intelligence, pages , [15] J. Broersen, M. Dastani, J. Hulstijn, and L. van der Torre. Goal generation in the BOID architecture. Cognitive Science Quarterly, 2(3-4): , [16] Jan Broersen, Mehdi Dastani, and Leendert van der Torre. Bdioctl: Obligations and the specification of agent behavior. In Proceedings of IJCAI 03, pages , [17] P. R. Cohen and H. J. Levesque. Intention is choice with commitment. Artificial Intelligence, 42(2-3): , [18] Rosaria Conte, Cristiano Castelfranchi, and Frank Dignum. Autonomous norm acceptance. In Jörg Müller, Munindar P. Singh, and Anand S. Rao, editors, Proceedings of the 5th International Workshop on Intelligent Agents V : Agent Theories, Architectures, and Languages (ATAL-98), volume 1555, pages Springer-Verlag: Heidelberg, Germany, [19] D. D. Harel amd Kozen and J. Tiuryn. Dynamic logic. In D. Gabbay and F. Guenthner, editors, Handbook of Philosophical Logic: Volume II: Extensions of Classical Logic, pages Reidel, Dordrecht, The Netherlands, [20] Mehdi Dastani, Farhad Arbab, and Frank S. de Boer. Coordination and composition in multi-agent systems. In Procs. of AAMAS, pages ,

Decentralized Control Obligations and permissions in virtual communities of agents

Decentralized Control Obligations and permissions in virtual communities of agents Decentralized Control Obligations and permissions in virtual communities of agents Guido Boella 1 and Leendert van der Torre 2 1 Dipartimento di Informatica, Università di Torino, Italy guido@di.unito.it

More information

Strategic Reasoning in Interdependence: Logical and Game-theoretical Investigations Extended Abstract

Strategic Reasoning in Interdependence: Logical and Game-theoretical Investigations Extended Abstract Strategic Reasoning in Interdependence: Logical and Game-theoretical Investigations Extended Abstract Paolo Turrini Game theory is the branch of economics that studies interactive decision making, i.e.

More information

Norms, Institutional Power and Roles : towards a logical framework

Norms, Institutional Power and Roles : towards a logical framework Norms, Institutional Power and Roles : towards a logical framework Robert Demolombe 1 and Vincent Louis 2 1 ONERA Toulouse France Robert.Demolombe@cert.fr 2 France Telecom Research & Development Lannion

More information

A Game-Theoretic Approach to Normative Multi-Agent Systems

A Game-Theoretic Approach to Normative Multi-Agent Systems A Game-Theoretic Approach to Normative Multi-Agent Systems Guido Boella 1 and Leendert van der Torre 2 1 Università di Torino, Dipartimento di Informatica 10149, Torino, Cso Svizzera 185, Italia guido@di.unito.it

More information

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures Mathematics and Social Choice Theory Topic 4 Voting methods with more than 2 alternatives 4.1 Social choice procedures 4.2 Analysis of voting methods 4.3 Arrow s Impossibility Theorem 4.4 Cumulative voting

More information

Chapter 11. Weighted Voting Systems. For All Practical Purposes: Effective Teaching

Chapter 11. Weighted Voting Systems. For All Practical Purposes: Effective Teaching Chapter Weighted Voting Systems For All Practical Purposes: Effective Teaching In observing other faculty or TA s, if you discover a teaching technique that you feel was particularly effective, don t hesitate

More information

Substantive and procedural norms in normative multiagent systems

Substantive and procedural norms in normative multiagent systems Journal of Applied Logic 6 (2008) 152 171 www.elsevier.com/locate/jal Substantive and procedural norms in normative multiagent systems Guido Boella a,, Leendert van der Torre b a Dipartimento di Informatica,

More information

From Argument Games to Persuasion Dialogues

From Argument Games to Persuasion Dialogues From Argument Games to Persuasion Dialogues Nicolas Maudet (aka Nicholas of Paris) 08/02/10 (DGHRCM workshop) LAMSADE Université Paris-Dauphine 1 / 33 Introduction Main sources of inspiration for this

More information

Check off these skills when you feel that you have mastered them. Identify if a dictator exists in a given weighted voting system.

Check off these skills when you feel that you have mastered them. Identify if a dictator exists in a given weighted voting system. Chapter Objectives Check off these skills when you feel that you have mastered them. Interpret the symbolic notation for a weighted voting system by identifying the quota, number of voters, and the number

More information

information it takes to make tampering with an election computationally hard.

information it takes to make tampering with an election computationally hard. Chapter 1 Introduction 1.1 Motivation This dissertation focuses on voting as a means of preference aggregation. Specifically, empirically testing various properties of voting rules and theoretically analyzing

More information

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory 3.1 Social choice procedures Plurality voting Borda count Elimination procedures Sequential pairwise

More information

Any non-welfarist method of policy assessment violates the Pareto principle: A comment

Any non-welfarist method of policy assessment violates the Pareto principle: A comment Any non-welfarist method of policy assessment violates the Pareto principle: A comment Marc Fleurbaey, Bertil Tungodden September 2001 1 Introduction Suppose it is admitted that when all individuals prefer

More information

Arguments and Artifacts for Dispute Resolution

Arguments and Artifacts for Dispute Resolution Arguments and Artifacts for Dispute Resolution Enrico Oliva Mirko Viroli Andrea Omicini ALMA MATER STUDIORUM Università di Bologna, Cesena, Italy WOA 2008 Palermo, Italy, 18th November 2008 Outline 1 Motivation/Background

More information

Illegal Migration and Policy Enforcement

Illegal Migration and Policy Enforcement Illegal Migration and Policy Enforcement Sephorah Mangin 1 and Yves Zenou 2 September 15, 2016 Abstract: Workers from a source country consider whether or not to illegally migrate to a host country. This

More information

Safe Votes, Sincere Votes, and Strategizing

Safe Votes, Sincere Votes, and Strategizing Safe Votes, Sincere Votes, and Strategizing Rohit Parikh Eric Pacuit April 7, 2005 Abstract: We examine the basic notion of strategizing in the statement of the Gibbard-Satterthwaite theorem and note that

More information

Norms in MAS: Definitions and Related Concepts

Norms in MAS: Definitions and Related Concepts Norms in MAS: Definitions and Related Concepts Tina Balke 1, Célia da Costa Pereira 2, Frank Dignum 3, Emiliano Lorini 4, Antonino Rotolo 5, Wamberto Vasconcelos 6, and Serena Villata 7 1 University of

More information

Goods, Games, and Institutions : A Reply

Goods, Games, and Institutions : A Reply International Political Science Review (2002), Vol 23, No. 4, 402 410 Debate: Goods, Games, and Institutions Part 2 Goods, Games, and Institutions : A Reply VINOD K. AGGARWAL AND CÉDRIC DUPONT ABSTRACT.

More information

A Game Theoretic Approach to Contracts in Multiagent Systems

A Game Theoretic Approach to Contracts in Multiagent Systems IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL X, NO XX, XX 20XX 2 A Game Theoretic Approach to Contracts in Multiagent Systems Guido Boella and Leendert van der

More information

On modelling burdens and standards of proof in structured argumentation

On modelling burdens and standards of proof in structured argumentation On modelling burdens and standards of proof in structured argumentation Henry PRAKKEN a, Giovanni SARTOR b a Department of Information and Computing Sciences, Utrecht University and Faculty of Law, University

More information

Coalitional Game Theory

Coalitional Game Theory Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter

More information

Topics on the Border of Economics and Computation December 18, Lecture 8

Topics on the Border of Economics and Computation December 18, Lecture 8 Topics on the Border of Economics and Computation December 18, 2005 Lecturer: Noam Nisan Lecture 8 Scribe: Ofer Dekel 1 Correlated Equilibrium In the previous lecture, we introduced the concept of correlated

More information

Computational Social Choice: Spring 2007

Computational Social Choice: Spring 2007 Computational Social Choice: Spring 2007 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today This lecture will be an introduction to voting

More information

Convergence of Iterative Voting

Convergence of Iterative Voting Convergence of Iterative Voting Omer Lev omerl@cs.huji.ac.il School of Computer Science and Engineering The Hebrew University of Jerusalem Jerusalem 91904, Israel Jeffrey S. Rosenschein jeff@cs.huji.ac.il

More information

Lecture 7 A Special Class of TU games: Voting Games

Lecture 7 A Special Class of TU games: Voting Games Lecture 7 A Special Class of TU games: Voting Games The formation of coalitions is usual in parliaments or assemblies. It is therefore interesting to consider a particular class of coalitional games that

More information

A Model of Normative Multi-Agent Systems and Dynamic Relationships

A Model of Normative Multi-Agent Systems and Dynamic Relationships A Model of Normative Multi-Agent Systems and Dynamic Relationships Fabiola López y López and Michael Luck Facultad de Ciencias de la Computación Benemérita Universidad Autónoma de Puebla, México fabiola@cs.buap.mx

More information

Limited arbitrage is necessary and sufficient for the existence of an equilibrium

Limited arbitrage is necessary and sufficient for the existence of an equilibrium ELSEVIER Journal of Mathematical Economics 28 (1997) 470-479 JOURNAL OF Mathematical ECONOMICS Limited arbitrage is necessary and sufficient for the existence of an equilibrium Graciela Chichilnisky 405

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO DEPARTMENT OF ECONOMICS

UNIVERSITY OF CALIFORNIA, SAN DIEGO DEPARTMENT OF ECONOMICS 2000-03 UNIVERSITY OF CALIFORNIA, SAN DIEGO DEPARTMENT OF ECONOMICS JOHN NASH AND THE ANALYSIS OF STRATEGIC BEHAVIOR BY VINCENT P. CRAWFORD DISCUSSION PAPER 2000-03 JANUARY 2000 John Nash and the Analysis

More information

Defensive Weapons and Defensive Alliances

Defensive Weapons and Defensive Alliances Defensive Weapons and Defensive Alliances Sylvain Chassang Princeton University Gerard Padró i Miquel London School of Economics and NBER December 17, 2008 In 2002, U.S. President George W. Bush initiated

More information

Important note To cite this publication, please use the final published version (if applicable). Please check the document version above.

Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Delft University of Technology Automated multi-level governance compliance checking King, Thomas; De Vos, Marina; Dignum, Virginia; Jonker, Catholijn; Li, Tingting; Padget, Julian; van Riemsdijk, Birna

More information

Choosing Among Signalling Equilibria in Lobbying Games

Choosing Among Signalling Equilibria in Lobbying Games Choosing Among Signalling Equilibria in Lobbying Games July 17, 1996 Eric Rasmusen Abstract Randolph Sloof has written a comment on the lobbying-as-signalling model in Rasmusen (1993) in which he points

More information

The Integer Arithmetic of Legislative Dynamics

The Integer Arithmetic of Legislative Dynamics The Integer Arithmetic of Legislative Dynamics Kenneth Benoit Trinity College Dublin Michael Laver New York University July 8, 2005 Abstract Every legislature may be defined by a finite integer partition

More information

11th Annual Patent Law Institute

11th Annual Patent Law Institute INTELLECTUAL PROPERTY Course Handbook Series Number G-1316 11th Annual Patent Law Institute Co-Chairs Scott M. Alter Douglas R. Nemec John M. White To order this book, call (800) 260-4PLI or fax us at

More information

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Jens Großer Florida State University and IAS, Princeton Ernesto Reuben Columbia University and IZA Agnieszka Tymula New York

More information

Complexity of Manipulating Elections with Few Candidates

Complexity of Manipulating Elections with Few Candidates Complexity of Manipulating Elections with Few Candidates Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 {conitzer, sandholm}@cs.cmu.edu

More information

Disagreement, Error and Two Senses of Incompatibility The Relational Function of Discursive Updating

Disagreement, Error and Two Senses of Incompatibility The Relational Function of Discursive Updating Disagreement, Error and Two Senses of Incompatibility The Relational Function of Discursive Updating Tanja Pritzlaff email: t.pritzlaff@zes.uni-bremen.de webpage: http://www.zes.uni-bremen.de/homepages/pritzlaff/index.php

More information

Social Choice & Mechanism Design

Social Choice & Mechanism Design Decision Making in Robots and Autonomous Agents Social Choice & Mechanism Design Subramanian Ramamoorthy School of Informatics 2 April, 2013 Introduction Social Choice Our setting: a set of outcomes agents

More information

Social Rankings in Human-Computer Committees

Social Rankings in Human-Computer Committees Social Rankings in Human-Computer Committees Moshe Bitan 1, Ya akov (Kobi) Gal 3 and Elad Dokow 4, and Sarit Kraus 1,2 1 Computer Science Department, Bar Ilan University, Israel 2 Institute for Advanced

More information

Sequential Voting with Externalities: Herding in Social Networks

Sequential Voting with Externalities: Herding in Social Networks Sequential Voting with Externalities: Herding in Social Networks Noga Alon Moshe Babaioff Ron Karidi Ron Lavi Moshe Tennenholtz February 7, 01 Abstract We study sequential voting with two alternatives,

More information

Logic for Automated Mechanism Design A Progress Report

Logic for Automated Mechanism Design A Progress Report Logic for Automated Mechanism Design A Progress Report Michael Wooldridge Thomas Agotnes Paul E. Dunne Wiebe van der Hoek Department of Computer Science University of Liverpool Liverpool L69 3BX, UK Department

More information

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002.

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002. Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002 Abstract We suggest an equilibrium concept for a strategic model with a large

More information

An Argumentation-based Computational Model of Trust for Negotiation

An Argumentation-based Computational Model of Trust for Negotiation An Argumentation-based Computational Model of Trust for Negotiation Maxime Morge 1 Abstract. The fact that open multiagent systems are vulnerable with respect to malicious agents poses a great challenge:

More information

Arrow s Impossibility Theorem on Social Choice Systems

Arrow s Impossibility Theorem on Social Choice Systems Arrow s Impossibility Theorem on Social Choice Systems Ashvin A. Swaminathan January 11, 2013 Abstract Social choice theory is a field that concerns methods of aggregating individual interests to determine

More information

Logic-based Argumentation Systems: An overview

Logic-based Argumentation Systems: An overview Logic-based Argumentation Systems: An overview Vasiliki Efstathiou ITI - CERTH Vasiliki Efstathiou (ITI - CERTH) Logic-based Argumentation Systems: An overview 1 / 53 Contents Table of Contents Introduction

More information

VOTING SYSTEMS AND ARROW S THEOREM

VOTING SYSTEMS AND ARROW S THEOREM VOTING SYSTEMS AND ARROW S THEOREM AKHIL MATHEW Abstract. The following is a brief discussion of Arrow s theorem in economics. I wrote it for an economics class in high school. 1. Background Arrow s theorem

More information

Institution Aware Conceptual Modelling

Institution Aware Conceptual Modelling Institution Aware Conceptual Modelling Paul Johannesson 1, Maria Bergholtz 1, and Owen Eriksson 2 1 Department of Computer and Systems Sciences, Stockholm University, Postbox 7003, SE 164 07 Kista, Sweden

More information

INTERNATIONAL ECONOMICS, FINANCE AND TRADE Vol. II - Strategic Interaction, Trade Policy, and National Welfare - Bharati Basu

INTERNATIONAL ECONOMICS, FINANCE AND TRADE Vol. II - Strategic Interaction, Trade Policy, and National Welfare - Bharati Basu STRATEGIC INTERACTION, TRADE POLICY, AND NATIONAL WELFARE Bharati Basu Department of Economics, Central Michigan University, Mt. Pleasant, Michigan, USA Keywords: Calibration, export subsidy, export tax,

More information

On the Rationale of Group Decision-Making

On the Rationale of Group Decision-Making I. SOCIAL CHOICE 1 On the Rationale of Group Decision-Making Duncan Black Source: Journal of Political Economy, 56(1) (1948): 23 34. When a decision is reached by voting or is arrived at by a group all

More information

THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT

THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT Last revision: 12/97 THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT Lucian Arye Bebchuk * and Howard F. Chang ** * Professor of Law, Economics, and Finance, Harvard Law School. ** Professor

More information

Abstract. 1 Introduction. Yoav Shoham and Moshe Tennenholtz Robotics Laboratory Department of Computer Science Stanford University Stanford, CA 94305

Abstract. 1 Introduction. Yoav Shoham and Moshe Tennenholtz Robotics Laboratory Department of Computer Science Stanford University Stanford, CA 94305 From: AAAI-92 Proceedings. Copyright 1992, AAAI (www.aaai.org). All rights reserved. On the synthesis of useful social (preliminary report) r artificial agent societies Yoav Shoham and Moshe Tennenholtz

More information

Chapter 14. The Causes and Effects of Rational Abstention

Chapter 14. The Causes and Effects of Rational Abstention Excerpts from Anthony Downs, An Economic Theory of Democracy. New York: Harper and Row, 1957. (pp. 260-274) Introduction Chapter 14. The Causes and Effects of Rational Abstention Citizens who are eligible

More information

Learning and Belief Based Trade 1

Learning and Belief Based Trade 1 Learning and Belief Based Trade 1 First Version: October 31, 1994 This Version: September 13, 2005 Drew Fudenberg David K Levine 2 Abstract: We use the theory of learning in games to show that no-trade

More information

Agenda trees and sincere voting: a response to Schwartz

Agenda trees and sincere voting: a response to Schwartz Public Choice (2010) 145: 213 221 DOI 10.1007/s11127-009-9562-4 Agenda trees and sincere voting: a response to Schwartz Nicholas R. Miller Received: 27 July 2009 / Accepted: 30 October 2009 / Published

More information

Voting Criteria April

Voting Criteria April Voting Criteria 21-301 2018 30 April 1 Evaluating voting methods In the last session, we learned about different voting methods. In this session, we will focus on the criteria we use to evaluate whether

More information

Complexity of Terminating Preference Elicitation

Complexity of Terminating Preference Elicitation Complexity of Terminating Preference Elicitation Toby Walsh NICTA and UNSW Sydney, Australia tw@cse.unsw.edu.au ABSTRACT Complexity theory is a useful tool to study computational issues surrounding the

More information

A representation theorem for minmax regret policies

A representation theorem for minmax regret policies Artificial Intelligence 171 (2007) 19 24 Research note www.elsevier.com/locate/artint A representation theorem for minmax regret policies Sanjiang Li a,b a State Key Laboratory of Intelligent Technology

More information

BOOK REVIEW BY DAVID RAMSEY, UNIVERSITY OF LIMERICK, IRELAND

BOOK REVIEW BY DAVID RAMSEY, UNIVERSITY OF LIMERICK, IRELAND B A D A N I A O P E R A C Y J N E I D E C Y Z J E Nr 2 2008 BOOK REVIEW BY DAVID RAMSEY, UNIVERSITY OF LIMERICK, IRELAND Power, Freedom and Voting Essays in honour of Manfred J. Holler Edited by Matthew

More information

A NOTE ON THE THEORY OF SOCIAL CHOICE

A NOTE ON THE THEORY OF SOCIAL CHOICE A NOTE ON THE THEORY OF SOCIAL CHOICE Professor Arrow brings to his treatment of the theory of social welfare (I) a fine unity of mathematical rigour and insight into fundamental issues of social philosophy.

More information

On Cooperation in Multi-Agent Systems a

On Cooperation in Multi-Agent Systems a On Cooperation in Multi-Agent Systems a J. E. Doran 1, S. Franklin 2, N. R. Jennings 3 & T. J. Norman 3 1. Dept. of Computer Science, University of Essex. 2. Dept. of Mathematical Sciences, University

More information

1 Electoral Competition under Certainty

1 Electoral Competition under Certainty 1 Electoral Competition under Certainty We begin with models of electoral competition. This chapter explores electoral competition when voting behavior is deterministic; the following chapter considers

More information

An example of public goods

An example of public goods An example of public goods Yossi Spiegel Consider an economy with two identical agents, A and B, who consume one public good G, and one private good y. The preferences of the two agents are given by the

More information

1 Aggregating Preferences

1 Aggregating Preferences ECON 301: General Equilibrium III (Welfare) 1 Intermediate Microeconomics II, ECON 301 General Equilibrium III: Welfare We are done with the vital concepts of general equilibrium Its power principally

More information

Notes for Session 7 Basic Voting Theory and Arrow s Theorem

Notes for Session 7 Basic Voting Theory and Arrow s Theorem Notes for Session 7 Basic Voting Theory and Arrow s Theorem We follow up the Impossibility (Session 6) of pooling expert probabilities, while preserving unanimities in both unconditional and conditional

More information

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Sibylle Fröschle and Sławomir Lasota Institute of Informatics, Warsaw University 02 097 Warszawa, Banacha 2, Poland sib,sl

More information

Uses and Challenges. Care. Health C. ents in H. ive Age. Normati. Javier Vazquez-Salceda Utrecht University.

Uses and Challenges. Care. Health C. ents in H. ive Age. Normati. Javier Vazquez-Salceda Utrecht University. ve Agealth : Uses and Challenges Javier Vazquez-Salceda Utrecht University it http://www.cs.uu.nl/people/javier lk Invited tal Motivation ealth Motivation o (I) New environment for Health services Need

More information

Strategic Voting and Strategic Candidacy

Strategic Voting and Strategic Candidacy Strategic Voting and Strategic Candidacy Markus Brill and Vincent Conitzer Abstract Models of strategic candidacy analyze the incentives of candidates to run in an election. Most work on this topic assumes

More information

Computational Social Choice: Spring 2017

Computational Social Choice: Spring 2017 Computational Social Choice: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today So far we saw three voting rules: plurality, plurality

More information

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York DEPARTMENT: Mathematics COURSE: MAT 2440/ MA 440 TITLE: DESCRIPTION: TEXTS: Discrete Structures and Algorithms I This course introduces

More information

arxiv: v1 [cs.gt] 11 Jul 2018

arxiv: v1 [cs.gt] 11 Jul 2018 Sequential Voting with Confirmation Network Yakov Babichenko yakovbab@tx.technion.ac.il Oren Dean orendean@campus.technion.ac.il Moshe Tennenholtz moshet@ie.technion.ac.il arxiv:1807.03978v1 [cs.gt] 11

More information

A denotational semantics for deliberation dialogues

A denotational semantics for deliberation dialogues A denotational semantics for deliberation dialogues Peter McBurney Department of Computer Science University of Liverpool Liverpool L69 3BX UK pjmcburney@csclivacuk Simon Parsons Department of Computer

More information

University of Utah Western Political Science Association

University of Utah Western Political Science Association University of Utah Western Political Science Association Bicameralism and the Theory of Voting: A Comment Author(s): Nicholas R. Miller Source: The Western Political Quarterly, Vol. 37, No. 4 (Dec., 1984),

More information

The Buddy System. A Distributed Reputation System Based On Social Structure 1

The Buddy System. A Distributed Reputation System Based On Social Structure 1 The Buddy System A Distributed Reputation System Based On Social Structure 1 Stefan Fähnrich, Philipp Obreiter, Birgitta König-Ries Institute for Program Structures and Data Organization Universität Karlsruhe

More information

THREATS TO SUE AND COST DIVISIBILITY UNDER ASYMMETRIC INFORMATION. Alon Klement. Discussion Paper No /2000

THREATS TO SUE AND COST DIVISIBILITY UNDER ASYMMETRIC INFORMATION. Alon Klement. Discussion Paper No /2000 ISSN 1045-6333 THREATS TO SUE AND COST DIVISIBILITY UNDER ASYMMETRIC INFORMATION Alon Klement Discussion Paper No. 273 1/2000 Harvard Law School Cambridge, MA 02138 The Center for Law, Economics, and Business

More information

A Rawlsian Paradigm Case

A Rawlsian Paradigm Case Economic Staff Paper Series Economics 3-1976 A Rawlsian Paradigm Case Ray Gardner Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/econ_las_staffpapers Part of the Economic

More information

Voting rules: (Dixit and Skeath, ch 14) Recall parkland provision decision:

Voting rules: (Dixit and Skeath, ch 14) Recall parkland provision decision: rules: (Dixit and Skeath, ch 14) Recall parkland provision decision: Assume - n=10; - total cost of proposed parkland=38; - if provided, each pays equal share = 3.8 - there are two groups of individuals

More information

Approval Voting and Scoring Rules with Common Values

Approval Voting and Scoring Rules with Common Values Approval Voting and Scoring Rules with Common Values David S. Ahn University of California, Berkeley Santiago Oliveros University of Essex June 2016 Abstract We compare approval voting with other scoring

More information

Enriqueta Aragones Harvard University and Universitat Pompeu Fabra Andrew Postlewaite University of Pennsylvania. March 9, 2000

Enriqueta Aragones Harvard University and Universitat Pompeu Fabra Andrew Postlewaite University of Pennsylvania. March 9, 2000 Campaign Rhetoric: a model of reputation Enriqueta Aragones Harvard University and Universitat Pompeu Fabra Andrew Postlewaite University of Pennsylvania March 9, 2000 Abstract We develop a model of infinitely

More information

Daron Acemoglu and James A. Robinson, Economic Origins of Dictatorship and Democracy. New York: Cambridge University Press, pp. Cloth $35.

Daron Acemoglu and James A. Robinson, Economic Origins of Dictatorship and Democracy. New York: Cambridge University Press, pp. Cloth $35. Daron Acemoglu and James A. Robinson, Economic Origins of Dictatorship and Democracy. New York: Cambridge University Press, 2006. 416 pp. Cloth $35. John S. Ahlquist, University of Washington 25th November

More information

"Efficient and Durable Decision Rules with Incomplete Information", by Bengt Holmström and Roger B. Myerson

Efficient and Durable Decision Rules with Incomplete Information, by Bengt Holmström and Roger B. Myerson April 15, 2015 "Efficient and Durable Decision Rules with Incomplete Information", by Bengt Holmström and Roger B. Myerson Econometrica, Vol. 51, No. 6 (Nov., 1983), pp. 1799-1819. Stable URL: http://www.jstor.org/stable/1912117

More information

Sub-committee Approval Voting and Generalized Justified Representation Axioms

Sub-committee Approval Voting and Generalized Justified Representation Axioms Sub-committee Approval Voting and Generalized Justified Representation Axioms Haris Aziz Data61, CSIRO and UNSW Sydney, Australia Barton Lee Data61, CSIRO and UNSW Sydney, Australia Abstract Social choice

More information

WHEN IS THE PREPONDERANCE OF THE EVIDENCE STANDARD OPTIMAL?

WHEN IS THE PREPONDERANCE OF THE EVIDENCE STANDARD OPTIMAL? Copenhagen Business School Solbjerg Plads 3 DK -2000 Frederiksberg LEFIC WORKING PAPER 2002-07 WHEN IS THE PREPONDERANCE OF THE EVIDENCE STANDARD OPTIMAL? Henrik Lando www.cbs.dk/lefic When is the Preponderance

More information

Jürgen Kohl March 2011

Jürgen Kohl March 2011 Jürgen Kohl March 2011 Comments to Claus Offe: What, if anything, might we mean by progressive politics today? Let me first say that I feel honoured by the opportunity to comment on this thoughtful and

More information

Voting System: elections

Voting System: elections Voting System: elections 6 April 25, 2008 Abstract A voting system allows voters to choose between options. And, an election is an important voting system to select a cendidate. In 1951, Arrow s impossibility

More information

Strategic Speech in the Law *

Strategic Speech in the Law * Strategic Speech in the Law * Andrei MARMOR University of Southern California Let us take the example of legislation as a paradigmatic case of legal speech. The enactment of a law is not a cooperative

More information

Economic philosophy of Amartya Sen Social choice as public reasoning and the capability approach. Reiko Gotoh

Economic philosophy of Amartya Sen Social choice as public reasoning and the capability approach. Reiko Gotoh Welfare theory, public action and ethical values: Re-evaluating the history of welfare economics in the twentieth century Backhouse/Baujard/Nishizawa Eds. Economic philosophy of Amartya Sen Social choice

More information

Technical Appendix for Selecting Among Acquitted Defendants Andrew F. Daughety and Jennifer F. Reinganum April 2015

Technical Appendix for Selecting Among Acquitted Defendants Andrew F. Daughety and Jennifer F. Reinganum April 2015 1 Technical Appendix for Selecting Among Acquitted Defendants Andrew F. Daughety and Jennifer F. Reinganum April 2015 Proof of Proposition 1 Suppose that one were to permit D to choose whether he will

More information

David Rosenblatt** Macroeconomic Policy, Credibility and Politics is meant to serve

David Rosenblatt** Macroeconomic Policy, Credibility and Politics is meant to serve MACROECONOMC POLCY, CREDBLTY, AND POLTCS BY TORSTEN PERSSON AND GUDO TABELLN* David Rosenblatt** Macroeconomic Policy, Credibility and Politics is meant to serve. as a graduate textbook and literature

More information

Committee proposals and restrictive rules

Committee proposals and restrictive rules Proc. Natl. Acad. Sci. USA Vol. 96, pp. 8295 8300, July 1999 Political Sciences Committee proposals and restrictive rules JEFFREY S. BANKS Division of Humanities and Social Sciences, California Institute

More information

International Cooperation, Parties and. Ideology - Very preliminary and incomplete

International Cooperation, Parties and. Ideology - Very preliminary and incomplete International Cooperation, Parties and Ideology - Very preliminary and incomplete Jan Klingelhöfer RWTH Aachen University February 15, 2015 Abstract I combine a model of international cooperation with

More information

The Provision of Public Goods Under Alternative. Electoral Incentives

The Provision of Public Goods Under Alternative. Electoral Incentives The Provision of Public Goods Under Alternative Electoral Incentives Alessandro Lizzeri and Nicola Persico March 10, 2000 American Economic Review, forthcoming ABSTRACT Politicians who care about the spoils

More information

Manipulating Two Stage Voting Rules

Manipulating Two Stage Voting Rules Manipulating Two Stage Voting Rules Nina Narodytska and Toby Walsh Abstract We study the computational complexity of computing a manipulation of a two stage voting rule. An example of a two stage voting

More information

Review of Christian List and Philip Pettit s Group agency: the possibility, design, and status of corporate agents

Review of Christian List and Philip Pettit s Group agency: the possibility, design, and status of corporate agents Erasmus Journal for Philosophy and Economics, Volume 4, Issue 2, Autumn 2011, pp. 117-122. http://ejpe.org/pdf/4-2-br-8.pdf Review of Christian List and Philip Pettit s Group agency: the possibility, design,

More information

What is Fairness? Allan Drazen Sandridge Lecture Virginia Association of Economists March 16, 2017

What is Fairness? Allan Drazen Sandridge Lecture Virginia Association of Economists March 16, 2017 What is Fairness? Allan Drazen Sandridge Lecture Virginia Association of Economists March 16, 2017 Everyone Wants Things To Be Fair I want to live in a society that's fair. Barack Obama All I want him

More information

U.S. Foreign Policy: The Puzzle of War

U.S. Foreign Policy: The Puzzle of War U.S. Foreign Policy: The Puzzle of War Branislav L. Slantchev Department of Political Science, University of California, San Diego Last updated: January 15, 2016 It is common knowledge that war is perhaps

More information

Sincere versus sophisticated voting when legislators vote sequentially

Sincere versus sophisticated voting when legislators vote sequentially Soc Choice Welf (2013) 40:745 751 DOI 10.1007/s00355-011-0639-x ORIGINAL PAPER Sincere versus sophisticated voting when legislators vote sequentially Tim Groseclose Jeffrey Milyo Received: 27 August 2010

More information

ARGUING ABOUT CONSTITUTIVE AND REGULATIVE NORMS. Gabriella Pigozzi & Leon van der Torre

ARGUING ABOUT CONSTITUTIVE AND REGULATIVE NORMS. Gabriella Pigozzi & Leon van der Torre ARGUING ABOUT CONSTITUTIVE AND REGULATIVE NORMS Gabriella Pigozzi & Leon van der Torre AIM An argumentation analysis of constitutive and regulative norms The conceptualisation of formal argumentation used

More information

VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA

VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA 1 VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA SANTA CRUZ wittman@ucsc.edu ABSTRACT We consider an election

More information

Fuzzy Mathematical Approach for Selecting Candidate For Election by a Political Party

Fuzzy Mathematical Approach for Selecting Candidate For Election by a Political Party International Journal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 2, Number 3 (2012), pp. 315-322 Research India Publications http://www.ripublication.com Fuzzy Mathematical Approach for Selecting

More information

John Rawls THEORY OF JUSTICE

John Rawls THEORY OF JUSTICE John Rawls THEORY OF JUSTICE THE ROLE OF JUSTICE Justice is the first virtue of social institutions, as truth is of systems of thought. A theory however elegant and economical must be rejected or revised

More information

The Effectiveness of Receipt-Based Attacks on ThreeBallot

The Effectiveness of Receipt-Based Attacks on ThreeBallot The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,

More information

Approaches to Voting Systems

Approaches to Voting Systems Approaches to Voting Systems Properties, paradoxes, incompatibilities Hannu Nurmi Department of Philosophy, Contemporary History and Political Science University of Turku Game Theory and Voting Systems,

More information